Abstract
Authentication is a process which is used for access control in computer security. However, common existing methods of authentication, which are based on authentication during the login stage, are insecure due to the lack of authentication after the initial instance. Ideally, authentication should be continuous and should not interfere with a user’s normal behavior as to not create an inconvenience for the user. Behaviometric identification, for example, verifies a user’s identity based on his behavior, both continuously and without interruption. This work shows that it is possible, with great accuracy, to identify different users based on their touchpad behaviors. While linear classifiers proved ineffective at classifying touchpad behavior, kernel density estimation and decision tree classification each proved capable of classifying data sets with over 90% accuracy.
Chapter PDF
Similar content being viewed by others
References
Angulo, J., Wästlund, E.: Exploring Touch-screen Biometrics for User Identification on Smart Phones. Privacy and Identity Management for Life 375, 130–143 (2012)
Campi, A.: How strong is strong user authentication? ISACA Journal 5, 42–45 (2012)
Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Transactions on Information Forensics & Security 8(1), 136–148 (2012), doi:10.1109/TIFS.2012.2225048
Gamboa, H., Fred, A.: A Behavioural Biometric System Based on Human Computer Interaction. In: Proc. SPIE, vol. 5404 (2004)
Juhola, M., Zhang, Y., Rasku, J.: Biometric verification of a subject through eye movements. Computers in Biology and Medicine 43, 42–50 (2013)
Kurkovsky, S., Syta, E.: Approaches and issues in location-aware continuous authentication. Computational Science and Engineering, 279–283 (2010), doi:10.1109/CSE.2010.42
Roy, A., Halevi, T., Memon, N.: An HMM-Based Behavior Modeling Approach for Continuous Mobile Authentication
Sae-Bae, N., Memon, N.: Online Signature Verification on Mobile Devices. 2014 IEEE Transactions on Information Forensics and Security 9(6), 933–947 (2014), doi:10.1109/TIFS
Sae-Bae, N., Ahmed, K., Isbister, K., Memon, N.: Biometric-Rich Gestures: A Novel Approach to Authentication on Multitouch Devices. In: Conference on Human Factors in Computing Systems (2012)
Sae-Bae, N., Memon, N., Isbister, K.: Investigating Multi-touch Gestures as a Novel Biometric Modality. In: 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems, BTAS (2012)
Saevanee, H., Bhatarakosol, P.: User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device. Computer and Electrical Engineering, 82–86 (2008), doi:10.1109/ICCEE.2008.157
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 IFIP International Federation for Information Processing
About this paper
Cite this paper
Chan, A., Halevi, T., Memon, N. (2014). Touchpad Input for Continuous Biometric Authentication. In: De Decker, B., Zúquete, A. (eds) Communications and Multimedia Security. CMS 2014. Lecture Notes in Computer Science, vol 8735. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44885-4_7
Download citation
DOI: https://doi.org/10.1007/978-3-662-44885-4_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-44884-7
Online ISBN: 978-3-662-44885-4
eBook Packages: Computer ScienceComputer Science (R0)